Skype Announces Four VoIP Over Wi-Fi Phones
Skype today announced four Wi-Fi phones that will let Skype users make free Skype calls using any Wi-Fi network. The phones will be pre-loaded with Skype software, and will let
Cisco Patches Several CS-MARS Vulnerabilities
Cisco has reported several vulnerabilities in its Cisco Security Monitoring, Analysis and Response System (CS-MARS) appliances that could allow remote attackers to gain unauthorized access to the appliance and view
Blogging Is All About Me
A new study turns up some interesting findings about bloggers and blogging. For instance, only about 1 out of 10 bloggers focus on politics and government.
Vonage Denies Spyware Charges
Vonage denies that it uses spyware to deliver its advertising, as charged yesterday by spyware researcher Ben Edelman.
Aruba, AirWave Team To Offer WLAN Management Tools
Aruba Networks and AirWave Wireless have teamed up to provide enterprises with an integrated solution to migrate their legacy wireless local area networks to a more up-to-date centralized architecture.
Vulnerability Found In D-Link Routers
A buffer overflow vulnerability discovered several D-Link wired and wireless routers could allow remote attackers to execute arbitrary code and potentially compromise entire networks.
Infineon Touts First UWB Transceiver
Infineon has finalized the tapeout of a dual-band ultrawideband transceiver that it claims will beef up mobile devices for broadband communications.
Vonage Ads Delivered Via A Dozen Spyware Makers: Report
Vonage engages in "widespread and substantial spyware-delivered advertising" with notorious spyware vendors, and its ads are sometimes displayed at sexually explicit sites, says well-known anti-spyware researcher Ben Edelman
Hiring Hackers: Would You Ever Trust Your Network Security To An Ex-Thief?
As the saying goes, if you can't beat them join them. But in the case of ex-hackers who abandon their criminal lives to pursue careers in corporate security, these security wizards often have already beaten the system and are now choosing to exploit it further by profiting from the expertise they gained at the expense of the organizations they once menaced.
Microsoft And Xen Team For Virtualization
With this move, Microsoft is expanding its support of virtualization in its most advanced software, and is doing so in a way that uses fewer system resources than past approaches.
FeedBurner Buys Blogbeat
The combined online service is expected to provide FeedBurner customers with the ability to compare data on feed subscribers and blog visitors.
WAN Services Vendor Straitshot Targets VoIP
Straitshot Communications, a Bellevue, Wash., vendor specializing in WAN services for bandwidth-hungry applications like VoIP, on Monday launched a new channel program for solution providers serving small and midsize businesses.
Product Announcement: Reactivity v4.4
Reactivity has announced availability of its newest family of XML-SOA products and they're not only looking sexy, but have some great new features designed to assist in speeding up your SOA initiative....
Cops, 3Com Roust Router Rip-off
Cops, crooks and cases of loot. It's about as exciting as things get in the channel. File this one under: When small VARs go bad.
Special Report: Standards Rule
IT execs love to hate the organizations that write technology standards--groups plagued by vendor influence and prone to indecision. Still, standards shape information technology as well as the business IT
Special Report: Standards Rule: Infrastructure
Thanks to Ethernet, the infrastructure space has had it easy in terms of standards. But we're not immune to them, and these standards are making our complex infrastructures even easier
Special Report: Standards Rule: Wireless
Expect to see an array of wireless systems tied together by higher-layer standards like IMS. Integrating those technologies in a way that allows a wide range of devices to move
Special Report: Standards Rule: Management
As enterprises adopt standards-based best practices to boost efficiency and comply with a growing number of regulations, management standards have become more important than ever.
EMC and RSA: A New Day for Data Security
EMC's acquisition of RSA gives the company a competitive advantage in the information security space and a golden opportunity to lead the market in a new direction.
Cisco Wireless Bugs--Deja Vu?
Bugs were recently found in Cisco's Wireless Control System that appear similar to past problems affecting its Wireless LAN Solution Engine. In each case, fixes required new code. But
Give Flash a Chance
Player 9 has serious improvements over its predecessor, including more options for programmers and faster content rendering. If you've dismissed Flash in the past, it's a good time to take
Voice Phishing Scams On The Rise
Scammers have begun using the telephone to harvest data for use in identity theft and credit card fraud, and voice-over-IP is making it easier for them to cover their tracks.